Members
Stats
  • Total Posts: 28514
  • Total Topics: 8240
  • Online Today: 816
  • Online Ever: 51419
  • (01. January 2010., 10:27:49)












Author Topic: Malware Threat Lists Called 'Useless'  (Read 1221 times)

0 Members and 1 Guest are viewing this topic.

Samker

  • SCF Administrator
  • *****
  • Posts: 7206
  • KARMA: 291
  • Gender: Male
  • Whatever doesn't kill us makes us stronger.
    • SCforum.info - Samker's Computer Forum
Malware Threat Lists Called 'Useless'
« on: 16. April 2008., 22:17:46 »


Security vendor PC Tools has questioned the usefulness of the threat lists used by many security companies to warn of current malware attacks.

The problem, according to the Australian company, is that the lists -- which are now regularly issued by almost every security software company - measure volumes rather than the underlying danger of a particular type of malware.

PC Tools, itself an anti-malware vendor in the same space, dismisses them as being "of no practical use for the security industry or consumers," and, not surprisingly, advocates its own ThreatExpert analysis system that cross-references volume with other factors such as the design complexity of a threat, its innovation, and its payload.

Examples of threats that regularly turn up on some lists but which pose relatively little danger include the four year-old Netsky, and the packer NSAnti, which itself is merely a means of hiding malware, and shouldn't even appear on such lists at all, the company said.

"Threat analysis is highly complex. There was a time when volume alone was an acceptable indicator of the level of threat. But the threat landscape has changed significantly and there are a number of additional parameters, besides volume, which are equally, if not more important in identifying and classifying top threats," said PC Tools CEO, Simon Clausen.

The underlying problem highlighted by the PC Tools blast is an interesting one. There is little independent security data that can be quickly understood by even experienced users. Typically, information lies in the hands of self-interested security vendors, who use it for marketing purposes.

There are a few exceptions to the rule such as third-party security information providers such as Danish outfit Secunia, but they focus on new threats. Working out which pose the greatest risk still requires a means of cross-checking real-world volumes with sophistication analyzed by looking at source code.

And then there is the dark suspicion many malware watchers have that the most dangerous attacks are the ones you never or rarely hear about until the criminals are long gone.

The company puts forward its own suggestions for the malware that the average user -- which is to say moderately protected user -- should worry about right now. These include the bot-builders Kraken/Bobax, Srizbi, Cutwail/Pandex as well as the ubiquitous Storm family.

Other popular and current threats include the fascinating MBR-infector Mebroot, which has attracted plenty of attention from industry insiders who see it as a clever throwback to virus techniques thought long dead, and social engineering infectors such as Zlob, which masquerades as a legitimate anti-spyware program.

Carole Theriault of Sophos took issue with the PC Tools assessment of threat lists in the strongest terms.

"I don't know of any reputable security company that only publishes top threat info without giving context or explanations. Talking about why a threat is more prevalent than any other is a great way to get the message out to computers users about the importance of security," she said.

"The mere fact that Netsky is still hammering away and infecting systems is VERY important. It shows that there are a large numbers of computers out there that have completely inadequate or nonexistent computer security."

(Copyright by PC World)

Samker's Computer Forum - SCforum.info

Malware Threat Lists Called 'Useless'
« on: 16. April 2008., 22:17:46 »




 

With Quick-Reply you can write a post when viewing a topic without loading a new page. You can still use bulletin board code and smileys as you would in a normal post.

Name: Email:
Verification:
Type the letters shown in the picture
Listen to the letters / Request another image
Type the letters shown in the picture:
Second Anti-Bot trap, type or simply copy-paste below (only the red letters):www.scforum.info:

Enter your email address to receive daily email with 'SCforum.info - Samker's Computer Forum' newest content:

Terms of Use | Privacy Policy | Advertising